From 44b02aa0d0489e48ddbaabeb319324233c2fd5c4 Mon Sep 17 00:00:00 2001 From: Vinay Pamnani <37223378+vinaypamnani-msft@users.noreply.github.com> Date: Wed, 12 Mar 2025 11:21:00 -0600 Subject: [PATCH] Update microsoft-recommended-driver-block-rules.md --- .../design/microsoft-recommended-driver-block-rules.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules.md b/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules.md index 52114f06a9..eee7e35d1d 100644 --- a/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules.md +++ b/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules.md @@ -49,7 +49,7 @@ Microsoft recommends enabling [HVCI](../../../../hardware-security/enable-virtua ## Steps to download and apply the vulnerable driver blocklist binary -If you prefer to apply the [vulnerable driver blocklist](#vulnerable-driver-blocklist-xml), follow these steps: +If you prefer to apply the vulnerable driver blocklist, follow these steps: 1. Download the [App Control policy refresh tool](https://aka.ms/refreshpolicy) 2. Download and extract the [vulnerable driver blocklist binaries](https://aka.ms/VulnerableDriverBlockList)